Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

PDF

Computer Engineering

2009

Institution
Keyword
Publication

Articles 1 - 30 of 349

Full-Text Articles in Engineering

Spectroscopicellipsometer And Polarmeter Systemis, John A. Woollam, Blaine D. Johs, Craig M. Herzinger, Ping He, Martin M. Liphardt, Galen L. Pfeiffer Dec 2009

Spectroscopicellipsometer And Polarmeter Systemis, John A. Woollam, Blaine D. Johs, Craig M. Herzinger, Ping He, Martin M. Liphardt, Galen L. Pfeiffer

Department of Electrical and Computer Engineering: Faculty Publications

A rotating compensator spectroscopic ellipsometer or polarimeter system having a source of a polychromatic beam of electromagnetic radiation, a polarizer, a stage for Supporting a material system, an analyzer, a dispersive optics and a detector system which comprises a multiplicity of detector elements, the system being functionally present in an environmental control chamber and therefore suitable for application in wide spectral range, (for example, 130-1700 nm). Preferred compensator design involves a Substantially achromatic multiple element compensator systems wherein multiple total internal reflections enter retardance into an entered beam of electromagnetic radiation, and the elements thereof are oriented to minimize changes …


Graphene On Pt(111): Growth And Substrate Interaction, Peter Sutter, Jerzy T. Sadowski, Eli Sutter Dec 2009

Graphene On Pt(111): Growth And Substrate Interaction, Peter Sutter, Jerzy T. Sadowski, Eli Sutter

Department of Electrical and Computer Engineering: Faculty Publications

In situ low-energy electron microscopy (LEEM) of graphene growth combined with measurements of the graphene structure and electronic band structure has been used to study graphene on Pt (111). Growth by carbon segregation produces macroscopic monolayer graphene domains extending continuously across Pt (111) substrate steps and bounded by strongly faceted edges. LEEM during cooling from the growth temperature shows the propagation of wrinkles in the graphene sheet, driven by thermal stress. The lattice mismatch between graphene and Pt (111) is accommodated by moiré structures with a large number of different rotational variants, without a clear preference for a particular interface …


Egoviz – A Mobile Based Spatial Interaction System, Keith Gardiner, Junjun Yin, James Carswell Dec 2009

Egoviz – A Mobile Based Spatial Interaction System, Keith Gardiner, Junjun Yin, James Carswell

Articles

This paper describes research carried out in the area of mobile spatial interaction and the development of a mobile (i.e. on-device) version of a simulated web-based 2D directional query processor. The TellMe application integrates location (from GPS, GSM, WiFi) and orientation (from digital compass/tilt sensors) sensing technologies into an enhanced spatial query processing module capable of exploiting a mobile device’s position and orientation for querying real-world 3D spatial datasets. This paper outlines the technique used to combine these technologies and the architecture needed to deploy them on a sensor enabled smartphone (i.e. Nokia 6210 Navigator). With all these sensor technologies …


Biological Sequence Simulation For Testing Complex Evolutionary Hypotheses: Indel-Seq-Gen Version 2.0, Cory L. Strope Dec 2009

Biological Sequence Simulation For Testing Complex Evolutionary Hypotheses: Indel-Seq-Gen Version 2.0, Cory L. Strope

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Reconstructing the evolutionary history of biological sequences will provide a better understanding of mechanisms of sequence divergence and functional evolution. Long-term sequence evolution includes not only substitutions of residues but also more dynamic changes such as insertion, deletion, and long-range rearrangements. Such dynamic changes make reconstructing sequence evolution history difficult and affect the accuracy of molecular evolutionary methods, such as multiple sequence alignments (MSAs) and phylogenetic methods. In order to test the accuracy of these methods, benchmark datasets are required. However, currently available benchmark datasets have limitations in their sizes and evolutionary histories of the included sequences are unknown. These …


Quality-Driven Cross Layer Design For Multimedia Security Over Resource Constrained Wireless Sensor Networks, Wei Wang Dec 2009

Quality-Driven Cross Layer Design For Multimedia Security Over Resource Constrained Wireless Sensor Networks, Wei Wang

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

The strong need for security guarantee, e.g., integrity and authenticity, as well as privacy and confidentiality in wireless multimedia services has driven the development of an emerging research area in low cost Wireless Multimedia Sensor Networks (WMSNs). Unfortunately, those conventional encryption and authentication techniques cannot be applied directly to WMSNs due to inborn challenges such as extremely limited energy, computing and bandwidth resources. This dissertation provides a quality-driven security design and resource allocation framework for WMSNs. The contribution of this dissertation bridges the inter-disciplinary research gap between high layer multimedia signal processing and low layer computer networking. It formulates the …


An Efficient Time-Bound Hierarchical Key Assignment Scheme With A New Merge Function: A Performance Study, Rajasree Shyam Dec 2009

An Efficient Time-Bound Hierarchical Key Assignment Scheme With A New Merge Function: A Performance Study, Rajasree Shyam

Computer Science Graduate Projects and Theses

The advent of digital age has resulted in more television consumers switching to Digital TV with considerable improvement in image quality and ease-of-use. Consumers are able to select and view television programs and channels of choice by using a pay-per-use model or streaming video from their computer terminals. In all these use cases, the media provider requires a means by which they can restrict the consumers from watching selected programs for a pre-approved temporal interval. The consumer needs to be prevented access to certain pay-per-use channels and programs upon expiry of this pre-approved access. This necessitates the media provider to …


Grating Lobe Reduction In Aperiodic Linear Arrays Of Physically Large Antennas, William C. Barott, Paul G. Steffes Dec 2009

Grating Lobe Reduction In Aperiodic Linear Arrays Of Physically Large Antennas, William C. Barott, Paul G. Steffes

Publications

We present performance bounds obtained from the optimization of the sidelobe levels of aperiodic linear arrays. The antennas comprising these arrays are large compared to the distance between neighboring antennas, a case not addressed in previously published work. This optimization is performed in pattern-space and is applicable over a wide range of scan angles. We show that grating lobes can be suppressed even when the elemental antennas are several wavelengths in size, provided that the ratio of the antenna size to the average spacing between the antenna center-points does not exceed 80%.


Towards Optimal Effort Distribution In Process Design Under Uncertainty, With Application To Education, Olga Kosheleva, Vladik Kreinovich Dec 2009

Towards Optimal Effort Distribution In Process Design Under Uncertainty, With Application To Education, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

In most application areas, we need to take care of several (reasonably independent) participants. For example, in controlling economics, we must make sure that all the economic regions prosper. In controlling environment, we want to guarantee that all the geographic regions have healthy environment. In education, we want to make sure that all the students learn all the needed knowledge and skills.

In real life, the amount of resources is limited, so we face the problem of "optimally" distributing these resources between different objects.

What is a reasonable way to formalize "optimally"? For each of the participants, preferences can be …


Optimal Sensor Placement In Environmental Research: Designing A Sensor Network Under Uncertainty, Aline James, Craig Tweedie, Tanja Magoc, Vladik Kreinovich, Martine Ceberio Dec 2009

Optimal Sensor Placement In Environmental Research: Designing A Sensor Network Under Uncertainty, Aline James, Craig Tweedie, Tanja Magoc, Vladik Kreinovich, Martine Ceberio

Departmental Technical Reports (CS)

One of our main challenges in meteorology and environment research is that in many important remote areas, sensor coverage is sparse, leaving us with numerous blind spots. Placement and maintenance of sensors in these areas are expensive. It is therefore desirable to find out how, within a given budget, we can design a sensor network are important activities was developing reasonable techniques for sensor that would provide us with the largest amount of useful information while minimizing the size of the "blind spot" areas which is not covered by the sensors.

This problem is very difficult even to formulate in …


Symmetries: A General Approach To Integrated Uncertainty Management, Vladik Kreinovich, Hung T. Nguyen, Songsak Sriboonchitta Dec 2009

Symmetries: A General Approach To Integrated Uncertainty Management, Vladik Kreinovich, Hung T. Nguyen, Songsak Sriboonchitta

Departmental Technical Reports (CS)

We propose to use symmetries as a general approach to maintaining different types of uncertainty, and we show how the symmetry approach can help, especially in in economics-related applications.


Fuzzy Transforms Of Higher Order Approximate Derivatives: A Theorem, Irina Perfilieva, Vladik Kreinovich Dec 2009

Fuzzy Transforms Of Higher Order Approximate Derivatives: A Theorem, Irina Perfilieva, Vladik Kreinovich

Departmental Technical Reports (CS)

In many practical applications, it is useful to represent a function f(x) by its fuzzy transform, i.e., by the "average" values over different elements of a fuzzy partition A1(x), ..., n(x) (for which Ai(x) >= 0 and A1(x) + ... + An(x) = 1). It is known that when we increase the number n of the partition elements Ai(x), the resulting approximation get closer and closer to the original function: for each value x0, the values Fi corresponding to the function Ai(x) for …


Checking Design Constraints At Run-Time Using Ocl And Aspectj, Yoonsik Cheon, Carmen Avila, Steve Roach, Cuauhtemoc Munoz Dec 2009

Checking Design Constraints At Run-Time Using Ocl And Aspectj, Yoonsik Cheon, Carmen Avila, Steve Roach, Cuauhtemoc Munoz

Departmental Technical Reports (CS)

Design decisions and constraints of a software system can be specified precisely using a formal notation such as the Object Constraint Language (OCL). However, they are not executable, and assuring the conformance of an implementation to its design is hard. The inability of expressing design constraints in an implementation and checking them at runtime invites, among others, the problem of design drift and corrosion. We propose runtime checks as a solution to mitigate this problem. The key idea of our approach is to translate design constraints written in a formal notation such as OCL into aspects that, when applied to …


Discrete Taylor Series As A Simple Way To Predict Properties Of Chemical Substances Like Benzenes And Cubanes, Jaime Nava, Vladik Kreinovich, Guillermo Restrepo, Douglas J. Klein Dec 2009

Discrete Taylor Series As A Simple Way To Predict Properties Of Chemical Substances Like Benzenes And Cubanes, Jaime Nava, Vladik Kreinovich, Guillermo Restrepo, Douglas J. Klein

Departmental Technical Reports (CS)

In many applications, we have numerous molecules that are obtained from a "template" molecule like benzene C6H6 or cubane C8H8 by replacing some of its hydrogen atoms with other atoms or atom groups (called ligands). Depending on how many original atoms are replaced and which ones are replaced, we obtain a large number of different chemical substances. It is desirable to be able, based on the measurements performed on a small number of such substances, to accurately predict the characteristics (such as energy) of all similar substances.

Such predictions are very important, since, e.g. cubanes, while kinetically stable, are highly …


A Bandwidth Aware Modification To The Dsr Routing Protocol For Wireless Mesh Networks, Mustafa Ramadhan, Mark Davis Dec 2009

A Bandwidth Aware Modification To The Dsr Routing Protocol For Wireless Mesh Networks, Mustafa Ramadhan, Mark Davis

Conference papers

This work proposes a bandwidth aware cross-layer modification to the DSR routing protocol. We include the Access Efficiency Factor (AEF) parameter in addition to the hop-count in the routing discovery mechanism. AEF is a measure to the local availability of bandwidth at a node. Employing the AEF as a metric in the routing discovery mechanism attempts to avoid routing through a congested area in the network. In this modification, we impose a limit on the hop-count in order to control the delay time in the network. The path selection procedure operates by finding a path with the highest minimum AEF …


Structured P2p Technologies For Distributed Command And Control, Daniel R. Karrels, Gilbert L. Peterson, Barry E. Mullins Dec 2009

Structured P2p Technologies For Distributed Command And Control, Daniel R. Karrels, Gilbert L. Peterson, Barry E. Mullins

Faculty Publications

The utility of Peer-to-Peer (P2P) systems extends far beyond traditional file sharing. This paper provides an overview of how P2P systems are capable of providing robust command and control for Distributed Multi-Agent Systems (DMASs). Specifically, this article presents the evolution of P2P architectures to date by discussing supporting technologies and applicability of each generation of P2P systems. It provides a detailed survey of fundamental design approaches found in modern large-scale P2P systems highlighting design considerations for building and deploying scalable P2P applications. The survey includes unstructured P2P systems, content retrieval systems, communications structured P2P systems, flat structured P2P systems and …


Appraising Critical Infrastructure Systems With Visualisation, Graeme Pye, Matthew Warren Dec 2009

Appraising Critical Infrastructure Systems With Visualisation, Graeme Pye, Matthew Warren

Australian Information Warfare and Security Conference

This paper explores the use of system modelling as an approach for appraising critical infrastructure systems. It reports on focus group findings with relation to the system modelling aspects of a critical infrastructure security analysis and modelling framework. Specifically, this discussion focuses on the interpretations of a focus group in terms of the likely benefits or otherwise of system visualisation. With the group focusing on its perceived value as an educational tool in terms of providing an abstract visualisation representation of a critical infrastructure system incident.


Cyber Influence, William Hutchinson Dec 2009

Cyber Influence, William Hutchinson

Australian Information Warfare and Security Conference

This paper explores influence in the cyber-world and the ability and effectiveness of influence campaigns in this medium. It examines the possibilities of influence in the online world as examines the potential of mobile technologies in this area. The contentious link between influence and behavioural change is investigated. Counterinfluence in the context of radicalisation is also looked at. Whilst it is inevitable that the digital medium is and will be used for influence campaigns and will be influential regardless if there are concerted ‘campaigns’ or not, it effects in terms of behavioural change are still open to question.


Safeguarding Australia From Cyber-Terrorism:A Proposed Cyber-Terrorism Scada Risk Framework For Industry Adoption, Christopher Beggs, Matthew Warren Dec 2009

Safeguarding Australia From Cyber-Terrorism:A Proposed Cyber-Terrorism Scada Risk Framework For Industry Adoption, Christopher Beggs, Matthew Warren

Australian Information Warfare and Security Conference

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems. This paper is an extension of work previously published by Beggs and Warren 2008, it presents a high level overview of a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework …


A Robust Damage Assessment Model For Corrupted Database Systems, Ge Fu, Hong Zhu, Yingjiu Li Dec 2009

A Robust Damage Assessment Model For Corrupted Database Systems, Ge Fu, Hong Zhu, Yingjiu Li

Research Collection School Of Computing and Information Systems

An intrusion tolerant database uses damage assessment techniques to detect damage propagation scales in a corrupted database system. Traditional damage assessment approaches in a intrusion tolerant database system can only locate damages which are caused by reading corrupted data. In fact, there are many other damage spreading patterns that have not been considered in traditional damage assessment model. In this paper, we systematically analyze inter-transaction dependency relationships that have been neglected in the previous research and propose four different dependency relationships between transactions which may cause damage propagation. We extend existing damage assessment model based on the four novel dependency …


The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo Dec 2009

The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo

All Faculty Scholarship

This article, written for the inaugural issue of a new journal, analyzes the extent to which the convergence of broadcasting and telephony induced by the digitization of communications technologies is forcing policymakers to rethink their basic approach to regulating these industries. Now that voice and video are becoming available through every transmission technology, policymakers can no longer define the scope of regulatory obligations in terms of the mode of transmission. In addition, jurisdictions that employ separate agencies to regulate broadcasting and telephony must reform their institutional structures to bring both within the ambit of a single regulatory agency. The emergence …


Coherent Phrase Model For Efficient Image Near-Duplicate Retrieval, Yiqun Hu, Xiangang Cheng, Liang-Tien Chia, Xing Xie, Deepu Rajan, Ah-Hwee Tan Dec 2009

Coherent Phrase Model For Efficient Image Near-Duplicate Retrieval, Yiqun Hu, Xiangang Cheng, Liang-Tien Chia, Xing Xie, Deepu Rajan, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

This paper presents an efficient and effective solution for retrieving image near-duplicate (IND) from image database. We introduce the coherent phrase model which incorporates the coherency of local regions to reduce the quantization error of the bag-of-words (BoW) model. In this model, local regions are characterized by visual phrase of multiple descriptors instead of visual word of single descriptor. We propose two types of visual phrase to encode the coherency in feature and spatial domain, respectively. The proposed model reduces the number of false matches by using this coherency and generates sparse representations of images. Compared to other method, the …


Classification, Clustering And Data-Mining Of Biological Data, Thomas Triplet Nov 2009

Classification, Clustering And Data-Mining Of Biological Data, Thomas Triplet

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The proliferation of biological databases and the easy access enabled by the Internet is having a beneficial impact on biological sciences and transforming the way research is conducted. There are currently over 1100 molecular biology databases dispersed throughout the Internet. However, very few of them integrate data from multiple sources. To assist in the functional and evolutionary analysis of the abundant number of novel proteins, we introduce the PROFESS (PROtein Function, Evolution, Structure and Sequence) database that integrates data from various biological sources. PROFESS is freely available athttp://cse.unl.edu/~profess/. Our database is designed to be versatile and expandable and will not …


Efficient Storage And Domain-Specific Information Discovery On Semistructured Documents, Fernando R. Farfan Nov 2009

Efficient Storage And Domain-Specific Information Discovery On Semistructured Documents, Fernando R. Farfan

FIU Electronic Theses and Dissertations

The increasing amount of available semistructured data demands efficient mechanisms to store, process, and search an enormous corpus of data to encourage its global adoption. Current techniques to store semistructured documents either map them to relational databases, or use a combination of flat files and indexes. These two approaches result in a mismatch between the tree-structure of semistructured data and the access characteristics of the underlying storage devices. Furthermore, the inefficiency of XML parsing methods has slowed down the large-scale adoption of XML into actual system implementations. The recent development of lazy parsing techniques is a major step towards improving …


A Clustering Based Discretization For Supervised Learning, Ankit Gupta, Kishan Mehrotra, Chilukuri K. Mohan Nov 2009

A Clustering Based Discretization For Supervised Learning, Ankit Gupta, Kishan Mehrotra, Chilukuri K. Mohan

Electrical Engineering and Computer Science - All Scholarship

We address the problem of discretization of continuous variables for machine learning classification algorithms. Existing procedures do not use interdependence between the variables towards this goal. Our proposed method uses clustering to exploit such interdependence. Numerical results show that this improves the classification performance in almost all cases. Even if an existing algorithm can successfully operate with continuous variables, better performance is obtained if variables are first discretized. An additional advantage of discretization is that it reduces the overall time-complexity.


Resource Management And Optimization In Wireless Mesh Networks, Xiaowen Zhang Nov 2009

Resource Management And Optimization In Wireless Mesh Networks, Xiaowen Zhang

FIU Electronic Theses and Dissertations

A wireless mesh network is a mesh network implemented over a wireless network system such as wireless LANs. Wireless Mesh Networks(WMNs) are promising for numerous applications such as broadband home networking, enterprise networking, transportation systems, health and medical systems, security surveillance systems, etc. Therefore, it has received considerable attention from both industrial and academic researchers. This dissertation explores schemes for resource management and optimization in WMNs by means of network routing and network coding. In this dissertation, we propose three optimization schemes. (1) First, a triple-tier optimization scheme is proposed for load balancing objective. The first tier mechanism achieves long-term …


A Framework For Bioacoustic Vocalization Analysis Using Hidden Markov Models, Yao Ren, Michael T. Johnson, Patrick J. Clemins, Michael Darre, Sharon Stuart Glaeser, Tomasz S. Osiejuk, Ebenezer Out-Nyarko Nov 2009

A Framework For Bioacoustic Vocalization Analysis Using Hidden Markov Models, Yao Ren, Michael T. Johnson, Patrick J. Clemins, Michael Darre, Sharon Stuart Glaeser, Tomasz S. Osiejuk, Ebenezer Out-Nyarko

Electrical and Computer Engineering Faculty Research and Publications

Using Hidden Markov Models (HMMs) as a recognition framework for automatic classification of animal vocalizations has a number of benefits, including the ability to handle duration variability through nonlinear time alignment, the ability to incorporate complex language or recognition constraints, and easy extendibility to continuous recognition and detection domains. In this work, we apply HMMs to several different species and bioacoustic tasks using generalized spectral features that can be easily adjusted across species and HMM network topologies suited to each task. This experimental work includes a simple call type classification task using one HMM per vocalization for repertoire analysis of …


Analysis And Diagnostics Of Adjacent And Nonadjacent Broken-Rotor-Bar Faults In Squirrel-Cage Induction Machines, Gennadi Y. Sizov, Ahmed Mohamed Sayed Ahmed, Chia-Chou Yeh, Nabeel Demerdash Nov 2009

Analysis And Diagnostics Of Adjacent And Nonadjacent Broken-Rotor-Bar Faults In Squirrel-Cage Induction Machines, Gennadi Y. Sizov, Ahmed Mohamed Sayed Ahmed, Chia-Chou Yeh, Nabeel Demerdash

Electrical and Computer Engineering Faculty Research and Publications

In this paper, faults associated with the rotor of an induction machine are considered. More specifically, effects of adjacent and nonadjacent bar breakages on rotor fault diagnostics in squirrel-cage induction machines are studied. It is shown that some nonadjacent bar breakages may result in the masking of the commonly used fault indices and, hence, may lead to a possible misdiagnosis of the machine. A discussion of the possible scenarios of these breakages as well as some conclusions regarding the types of squirrel-cage induction machines (number of poles, number of squirrel-cage bars, etc.) that may be more prone to these nonadjacent …


From Gauging Accuracy Of Quantity Estimates To Gauging Accuracy And Resolution Of Measuring Physical Fields, Vladik Kreinovich, Irina Perfilieva Nov 2009

From Gauging Accuracy Of Quantity Estimates To Gauging Accuracy And Resolution Of Measuring Physical Fields, Vladik Kreinovich, Irina Perfilieva

Departmental Technical Reports (CS)

For a numerical physical quantity v, because of the measurement imprecision, the measurement result V is, in general, different from the actual value v of this quantity. Depending on what we know about the measurement uncertainty d = V - v, we can use different techniques for dealing with this imprecision: probabilistic, interval, etc.

When we measure the values v(x) of physical fields at different locations x (and/or different moments of time), then, in addition to the same measurement uncertainty, we also encounter another type of localization uncertainty: that the measured value may come not only from the desired location …


A Broad Prospective On Fuzzy Transforms: From Gauging Accuracy Of Quantity Estimates To Gauging Accuracy And Resolution Of Measuring Physical Fields, Vladik Kreinovich, Irina Perfilieva Nov 2009

A Broad Prospective On Fuzzy Transforms: From Gauging Accuracy Of Quantity Estimates To Gauging Accuracy And Resolution Of Measuring Physical Fields, Vladik Kreinovich, Irina Perfilieva

Departmental Technical Reports (CS)

Fuzzy transform is a new type of function transforms that has been successfully used in different application. In this paper, we provide a broad prospective on fuzzy transform. Specifically, we show that fuzzy transform naturally appears when, in addition to measurement uncertainty, we also encounter another type of localization uncertainty: that the measured value may come not only from the desired location x, but also from the nearby locations.


Model Fusion Under Probabilistic And Interval Uncertainty, With Application To Earth Sciences, Omar Ochoa, Aaron A. Velasco, Christian Servin, Vladik Kreinovich Nov 2009

Model Fusion Under Probabilistic And Interval Uncertainty, With Application To Earth Sciences, Omar Ochoa, Aaron A. Velasco, Christian Servin, Vladik Kreinovich

Departmental Technical Reports (CS)

One of the most important studies of the earth sciences is that of the Earth's interior structure. There are many sources of data for Earth tomography models: first-arrival passive seismic data (from the actual earthquakes), first-arrival active seismic data (from the seismic experiments), gravity data, and surface waves. Currently, each of these datasets is processed separately, resulting in several different Earth models that have specific coverage areas, different spatial resolutions and varying degrees of accuracy. These models often provide complimentary geophysical information on earth structure (P and S wave velocity structure).

Combining the information derived from each requires a joint …